Terminator for Spam - A Fuzzy Approach Revealed
|
|
- Solomon Howard
- 5 years ago
- Views:
Transcription
1 Terminator for Spam - A Fuzzy Approach Revealed P.SUDHAKAR 1, G.POONKUZHALI 2, K.THIAGARAJAN 3, K.SARUKESI 4 1 Vernalis systems Pvt Ltd, Chennai Department of Computer Science and Engineering, Rajalakshmi Engineering College, Affiliated to Anna University- Chennai, Tamil Nadu 3 Department of Science and Humanities, KCG College of Technology Affiliated to Anna University-Chennai, Tamil Nadu 4 Hindustan Institute of Technology and Science-Chennai,Tamil Nadu INDIA 1 sudhakar.asp@gmail.com, 2 poonkuzhali.s@rajalakshmi.edu.in, 3 vidhyamannan@yahoo.com, 4 profsaru@gmail.com Abstract - In this information technology world, the highest degree of communication happens through s. Realistically most of the inboxes are flooded with spam s as most of transactions through this internet is affected by Passive attacks and Active attacks. Several algorithms exist in the e-world to defend against spam s. But the fulfilment of accuracy in deducting spam is still oscillating between 80-90%. This clearly shows the necessity for improvement in spam control algorithms on various projections. In this proposed work a new solvent was chosen in the fuzzy word to combat against spam e- mails. Various fuzzy rules are created for spam s and every is enforced to pass through fuzzy rule filter for identifying spam. Results of the each fuzzy rule for the input e- mails are derived to classify the to be spam or consent. Key-Words - , spam, Fuzzy, Fuzzy Control, Fuzzy logic, Spam, Spam deduction, User Attitude. E I. INTRODUCTION -mail spam, known as unsolicited bulk (UBE), junk mail, or unsolicited commercial (UCE), is the practice of sending unwanted messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. Spam in started to become a problem when the Internet was opened up to the general public in the mid-1990s. It grew exponentially over the following years, and today composes some 80 to 85% of all the in the world, by a "conservative estimate". Pressure to make spam illegal has been successful in some jurisdictions, but less so in others [1]. Spammers take advantage of this fact, and frequently outsource parts of their operations to countries where spamming will not get them into legal trouble. Though, is undoubtedly a very effective method of communication these days but at times it can be quite vexing when one is confronted with so many unwanted s where the recipients miss their important s just because their mailbox space is often eaten up by these unwanted s. The legal status of spam varies from one jurisdiction to another. Spammers collect addresses from chat rooms, websites, customer lists, newsgroups, and viruses which harvest users' address books, and are sold to other spammers. They also use a practice known as " appending" or "epending" in which they use known information about their target (such as a postal address) to search for the target's address. Much of spam is sent to invalid addresses. Spam averages 78% of all sent. According to the Message Anti-Abuse Working Group, the amount of spam was between 88-92% of messages sent in the first half of Most of the inbox is flooded with these Spams which occupies lot of memory space. There are several algorithms available for detecting and filtering spam e- mails. Among the existing algorithms, Bayesian filtering produces best result, still it does not detect all the spam e- mails. Most of the existing algorithms considers content alone for filtering the spam s. To detect all the spam s, existing spam filtering methods has to be enhanced. In this proposed work, a new algorithm is devised with various fuzzy rules and fuzzy variables. Each fuzzy rule will produce Attack Factor values which are consider for arriving result. Each rule Attack Factor value was arrived by comparing input parameter against Black list and White List. Black list contains predetermined spam content. White list contains acceptable contents. This final result from above calculated Attack Factor will decide the input content to be spam or ham or to be sent hold state. The final result of the algorithm was obtained by summing up each rule result value and decision was taken based on the result of the individual rules. 332
2 i. RELATED WORKS Xavier Carreras et al.[2] proposed a Boosting algorithm for Anti Spam filtering. Even though Boosting algorithm delivers good result, possibility of misclassification costs persist inside the AdaBoost learning algorithm. William W. Cohen et al.[3] suggested Speech act theory for filtering. The outcome of Speech act theory highly depend on the learning and this approach shows new projection for classifying spam content. Harris Drucker et al.[7] developed support vector Machines for Spam Categorization. Even though support vector approach outperforms well, switching from training model need user intervention. Addition to that, reply s are considered as no spam. Joes M.Gomez Hidalgo et al.[8] presents a new dimension for spam classification. Nikolos et al.[13] implemented new technique for spam categorization couple with header information and content information. However this system is under research in peer to peer networks. Even though the conceptualization is good, but the practical bottle neck will comes for identification of spam words from the global set. This will take large amount of time as it works with centralized architecture. Peng et al.[9] Proprosed a new system for applying spam filter in distributed environment. The proposed techniques out performs well during implementation of spam filter in the distributed system. But Author fails to state the technique that can be used to identify spam based on content. The technique handled in this approach ( copy rank ) performs based on header rather than header and body content. Wanli et al.[10] projected a new techniques for identifying spam of content type image. But the experimental results shows less confidence on their approach due to misclassification. From the misclassification list, image based classification got highest rank over other text, HTML and non English text classifications. Sadegh et al.[12] follow through a new approach called Bayesian spanning tree with Likelihood function to identify the in the space. From the likelihood classification, Bayesian Spanning Tree outperforms well compared to Navie Bayesian approach by considering precision and F-measure as measurement. Nevertheless Bayesian approach produces high result, still there is a large space to reach 100% accuracy. Bayesian precision measure declares at the maximum of 85% efficiency can be obtained by using Bayesian spanning tree. ii. OUTLINE OF THE DOCUMENT Section 2 composes various fuzzy rules formation for the input parameters to identify the as a spam or consent. Section 3 Implements the fuzzy rules formed over input (s). Section 4 predicts the input and categorize into appropriate buckets. Section 5 proposes results and discussion on the results with future work. II. FUZZY SYSTEM AND FUZZY RULES GENERATION Fuzzy Logic (FL) is a problem-solving control system methodology that lends itself to implementation in systems ranging from simple, small, embedded microcontrollers to large, networked, multi-channel PC or workstation-based data acquisition and control systems. It can be implemented in hardware, software, or a combination of both. FL provides a simple way to arrive at a definite conclusion based upon vague, ambiguous, imprecise, noisy, or missing input information. FL's approach to control problems mimics how a person would make decisions, only much faster. Fuzzy rules have been advocated as a key tool for expressing pieces of knowledge in fuzzy logic i. FUZZYFICATION Input variable : {Sender saddress, Sender_IP, Subject_Words, ContentWords, Attachment} Fuzzy set : {positive, Zero, Negative} Linguistic set : (highpositive, highnegative, Zero} Rule 1: a: IF SenderAddress spammer list AttackFactor=-0.25; b: IF SenderAddress to Ham list AttackFactor=0.25; c : IF Sender Address Spammerlist & Sender address Ham addresslist AttackFactor=0; Explanation: Rule 1.a : If there exist a sender address belongs to spammer list, then Attack Factor of this rule should be set to -0.25; Rule 1.b : If there exist a sender address belongs to Ham list then, Attack Factor of this rule should be set to 0.25; Rule 1.c : If there exist a sender address that doesn t belongs to spammer list and Ham list then, Attack Factor of this rule should be set to 0; 333
3 Rule 2 : a: IF Sender_IP SpammerIPlist AttackFactor= -0.25; b: IF Sender_IP HamIPlist AttackFactor=0.25; c: IF Sender_IP SpammerIPlist & HamIPlist AttackFactot=0; Explanation: Rule 5.a : If all attachment doesn t belong to virus list then, Attack Factor of this rule is set to 1.0; Rule 5.b : If there exist an attachment belongs to virus list, then Attack Factor of this rule is set to -1.0; Explanation: Rule 2.a : If there exists a sender IP address belongs to Spammer list, then Attack Factor of this rule should be set to -0.25; Rule 2.b : if there exists a sender IP address belongs to Ham list, then Attack Factor of this rule was set to 0.25; Rule 2.c : If there exists a sender IP address doesn t belongs to Spammer list and Ham List then Attack Factor of this rule was set to 0; III. FUZZY RULE IMPLEMENTATION Rule 3: a: IF Subject words Spam words AttackFactor= -0.50; b: IF Subjectword Spamwords <AttackFactor< 0.50 Explanation: Rule 3.a: If all Subject words belongs to Spam words then, Attack Factor of this rule should be set to -0.50; Rule 3.b : If there exists a subject word that belongs to spam word then Attack Factor of this rule is varies from to +0.50; Rule 4: a: IF Content words Spamwordlist AttackFactor= -0.50; b: IF Content words Spamwordslist <AttackFactor< 0.50; Explanation: Rule 4.a : If all content words belongs to Spam words then, Attack Factor of this rule should be set to -0.50; Rule 4.b : If there exists an content word that belongs to spam word then Attack Factor of Rule 5 : this rule is varies from to +0.50; a: IF Attachment VirusList AttackFactor=1.0; b: IF Attachment Visuslist AttackFactor= -1.0; Figure 1. Architecture of proposed system When an is arrived, identified fuzzy input parameters are extracted and it is passed to fuzzy system for identification as per Figure1. After Fuzzyfication and Defuzzyfication categorized s are send back to user. Detailed internal follow was shown in Figure 2. Rule 1 was applied on Fuzzy input parameter- Sender address. Based on Rule 1, Sender address was extracted from and compared against the Black list which has spammer address list. If any match was found then, Attack Factor for this rule was set to If sender address was not found in the black list, then it was compared against the White list which contains all good and acceptable addresses. If match was found, then attack factor for this rule was set to If sender address was not found in both Black and White list, then attack factor for this rule was set to 0. Set this rule result in R1. Rule 2 was applied on Fuzzy Input parameter- Sender IP. IP Address of the sender was compared against the IP Address Black List. If match was found, then Rule 2 Attack Factor was set to If not found, then Sender IP Address was compared against White List IP Address. 334
4 If match found then attack factor of Rule 2 was set to If not found then Attack Factor of the Rule 2 was set to 0. Assign resultant value in R2. Rule 3 was applied on Fuzzy input parameter- Subject words. An may contain one or more words in subject line. All subject word and Content words are preprocessed. The pre-process contains the following steps i.e. stemming, stop words elimination and tokenization. Stemming is the process of comparing the root forms of the searched terms to the documents in its database. Stop words elimination is the process of not considering certain words which will not affect the final result. Tokenization is defined as splitting of the words into small meaning full constituents Algorithm for Subject Attack Factor Calculation: Step 1 :Split the Subject content into words say W i where n i 1 Step 2 : assign to T w = n Step 3 :Calculate word Impact Factor W f where W f = 0.5 /T w Step 4 :Perform comparison for each word W i in Black list Step 5 :If match found then update the update W fi = - W f else W fi = W f ; where i <= T w ; Step 6 : Calculate Attach Factor = Step 7 : Calculate R3 = ; From the subject line after pre-processing total words are counted and each word impact on for this rule is calculate. i,e average impact. Now each word are compared against black and white list already available. If it is found in white list then the Attack factor for this word is set as positive. If it is found in black list then the Attack factor was set as negative. Example : Total words = 5 W f = 0.5 / 5 = 0.1 If the word W i is present in While list then the AttackFactor = If the word Wi is present in the Black list then the Attack Factor = Rule 4 was applied on Fuzzy Input variable- ContentWords after Pre-Processing. Every body may contain one or more words. Every words are taken and compared against the Block list words. Following are the Algorithm to compute Attack Factor of Rule 4. Algorithm for Content Attack Factor Calculation: Step 1 :Split the bodycontent to words say W i where i 1 Step 2: Count the total number of words in Bodyand assign to Tw Step 3 : If T w > 0 then continue Step 4. Step 4 :Calculate word impact factor W f where W f = 0.5 /T w Figure 2. Detailed system flow After pre processing all words are taken and compared against the Black list words. Every words impact (Attack Factor) on this subject line was calculated. Following are Algorithm to compute Attack Factor of Rule 3 Step 5 :Perform comparison for each word Wi in Black list Step 6 :If match found then update the update W fi = - W f else W fi = W f ; where i Tw; Step 7 :Calculate Attach Factor = Step 8 : Calculate R4 = ; Rule 5 was applied to calculate Attack Factor for containing attachment. If does not contain Attachment, then Attack Factor was set to zero. If any one of the attachment content was identified in virus list then Attack Factor was set to -1. If none of the content 335
5 was identified in virus list, then Attack Factor was set to 1. Rule 5 result was assigned to R5. Defuzzification: Result value of each was arrived by sum up previous rule results and these results are termed as decision making factors. R1 = R1; R2 = R2 + R1; R3 = R3 + R2; R4 = R4 + R3; R5 = R5 + R4; IV. RESULTS BASED ON USER ATTITUDE AND DISCUSSION Every rule results are obtained and user attitude was taken consideration for categorizing input s. User Attitude was initially configured to take decision based on fuzzy Linguistic set {High Positive, zero, high negative}. High positive users are type of user who strictly restricts spam s. Zero level users are neutral user who does not have restriction. High negative users are more interested in receiving spam s. Following are the possible values of the Linguistic Set High Positive 0.25; Zero = 0; High Negative Decision making for High Negative level user: If user s attitude level was set High Negative and all rule result value is then the e- mail is declared as consent. If user s attitude level was set as High Negative and any one the rule result value is < then the is set to Hold in which user can take final decision. All fuzzy rules are applied over 243 different kind of e- mails using fuzzy input variables: Sender s Address, Sender, Subject Words, Content Words and Attachment. Results of some sample s are distributed in the following tables. Table 1. Results based on Fuzzy Rules with High positive user Attitude E- mail Fuzzy Results Sour ce Rule1 Rule2 Rule3 Rule4 Rule5 Result E Consent E Spam E Hold E Consent E Spam E Hold Following are the decision making process. Decision making for High positive level users: If user s attitude was set as high positive and all applied rules values are > 0.25 then the is declared as consent. If user s attitude was set as high positive and any one of the rule result value various between 0.25 to 0 then the is declared as hold. If user s attitude was set as high positive and any one of the rule value is < 0 then the is set to Spam. Decision making for Zero level user: If user s attitude level was set as Zero and all rule result value is 0 then the is declared as consent. If user s attitude level was set as Zero and any one of rule value is < 0 then the is set to Spam. Figure 3. Graphical representation of Table 1 336
6 Table 2. Results based on Fuzzy user with Zero user Attitude Source Fuzzy Results Rule1 Rule2 Rule3 Rule4 Rule5 Result E Consent E Spam E Consent E Consent E Spam E Consent Figure 5. Graphical representation of Table 3 Table 4 : Results based on Fuzzy Rules with different user Attitudes ES R1 R2 R2 R4 R5 HP Z HN E Consent Consent Consent E Hold Consent Consent E Hold Consent Consent E Spam Spam Spma E Spam Spam Consent E Hold Consent Consent Figure 4. Graphical representation of Table2 From Fig 4 represents nature. If we see any that has negative region then the is set to spam. From the graph we can identify E2 and E5 are spam as it grows in negative region. Table 3. Results based on Fuzzy Rules with high negative user Attitude E- mail Fuzzy Results Sourc e Rule1 Rule2 Rule3 Rule4 Rule5 Result E Spam E Consent E Consent E Spam E Consent E Consent From table 3 the results can be easily predicted that the relaxation of user who intentionally wish to accept spam s, user level was set to So the range from and above the s are categorized as Consent. Below the level, s are categorized as Hold. The same was represented in a graphical manner in Fig 4. ES Source RX Rule X where X varies from 1 to 5 HP High Positive user Attitude Z - Zero user Attitude HN High Negative user Attitude Table 4 Consolidates different user projections on the same with samples. All possible combination results are provided in Appendix different sets of s are taken for evaluation and results are represented in following figures Figure 6. High positive user s attitude Out of 243 s based on high positive user s attitude, 22 e-malis are categorized as Consent, 41 e-malis are 337
7 categorized in Hold state and 180 s are stamped as spam. Acknowledgment The authors would like to thank Dr. Ponnammal Natarajan worked as Former Director Research, Anna University- Chennai,India and currently an Advisor, (Research and Development), Rajalakshmi Engineering College and Dr. K..Ravi, Associate Professor, Department of Mathematics, Sacred Heart College- Tirupattur, India for their intuitive ideas and fruitful discussions with respect to the paper s contribution. REFERENCES Figure 7. Zero level user s attitude Out of 243 s based on zero level user s attitude, 68 e-malis are categorized as Consent and 180 s are stamped as spam. Figure 8. High Negative user s attitude Out of 243 s based on High Negative user s attitude, 112 e-malis are categorized as Consent and 131 s are categorized as Hold. CONCLUSION AND FUTURE WORK In this proposed work, Fuzzy rules are constructed for 5 input parameters namely Sender s Address, Sender_IP, Subject_Words, Content Words and Attachment for common user to deduct the spam s based on the attitude of the user. The proposed simplistic approach out performs in terms of accuracy in deducting spam s than the existing approaches provided the Black list and White lists to be up to date. The proposed approach works only for s having subject and body content as plain text. Future work aims at deducting spam s having images and HTML also. [1] Metrics report [2] Carreras, X. and Mdrquez, L., Boosting trees for anti-spare filtering, In Proc. of RANLP, [3] Cohen, W.W., Learning Rules that Classify ., Proceedings. of the AAAI Spring Symposium on Machine Learning in Information Access, Stanford, California,1996. [4] Cournane, A. and Hunt, R., An Analysis of the Tools Used For the Generation and Prevention of Spam, Computer and Security, Vol. 23, pp , [5] Cox, E., The Fuzzy System Handbook, Academic Press, Second Edition, [6] Daelemans, W., Z. Jakub, K. van der [7] Sloot and A. van den Bosch, TiMBL: Tilburg Memory Based Learner, version 2.0, Reference Guide. ILK,Computational Linguistics, Tilburg University [8] Drucker, H., Wu, D., & Vapnik, V., Support vector machines for Spam categorization. IEEE-NN, Vol. 10, No.5, pp ,1999. [9] Graham, P., Better Baysian Filtering. In Proceedings of Spam Conference [10] Peng Liu, Guangliang Chen, Liang Ye, Weiming Zhong, Proceedings of the 5th WSEAS Int. Conf. On Simulation, Modeling and Optimization, Corfu, Greece, August 17-19, 2005 (pp61-66). [11] Wanli Ma, Dat Tran, Dharmendra Sharma, Sen Li, Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January 17-19, [12] Hidalgo, J. G., Spez, M, and Sanz, E, Combining text and heuristicz for cost-sensitive spam filtering. In Proc. of CONL, [13] Sadegh Kharazmi, Ali FarahmandNejad, Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, [14] Nikolaos Korfiatis, Marios Poulosy, Sozon Papavlassopoulos, Proceeding of the WSEAS International Conference on Applied Mathematics, Greece, Aug 19, 2004 ( ). [15] Lee, J., Spam: An escalating attack of the clones, The New York Times, [16] Mayer, C., and Eunjung-Cha, A., Making spam go splat: Sick of unsolicited , [17] businesses are fighting back, The Washington Post, [18] Norvig P. and Russell S., Artificial Intelligence A Modern Approach, Prentice Hall, New Jersey, [19] Nozaki, K., Ishibushi, H. and Tanaka, H., Trainable Fuzzy classification systems based on Fuzzy If-Then-Rules, Proc. IEEE, vol. 1, pp , [20] RFC 822: Standard for the Format of Arpa Internet Text Messages, [21] Sahami, M., Dumais, S., Heckerman, D. and Horvitz, E., A Bayesian Approach to Filtering Junk . In Learning for Text Categorization, AAA1 Workshop, pp , Madison Wisconsin, [22] SpamAssassin,
8 [23] Sudhakar.P, Poonkuzhali.S, Thiagarajan.K and Sarukesi.K., Fuzzy Logic for Spam deduction, Proceedings of the WSEAS 10th International Conference on Applied Computer and Applied Computational Science, Venice, Italy, March 8-10, 2011 ISBN: [24] Poonkuzhali.S, Thiagarajan.K, P.Sudhakar Kishore Kumar.R and Sarukesi.K., Spam Filtering using Signed and Trust Reputation Management, Proceedings of the WSEAS 10th International Conference on Applied Computer and Applied Computational Science, Venice, Italy, March 8-10, 2011 ISBN: P.Sudhakar received Bachelor of Engineering degree in Computer science from Anna University Chennai-India in 2006 and Master of Engineering degree in Computer Science from Anna University Chennai-India in He started his carrier as a Junior software programmer in Vernalis systems Pvt Ltd, Chennai India at 2008 and elevated to Associate software. He also presented various papers in National level conferences and published his research work in International Conferences and Journals. G.Poonkuzhali received B.E degree in Computer Science and Engineering from University of Madras, Chennai, India, in 1998, and the M.E degree in Computer Science and Engineering from Sathyabama University, Chennai, India, in Currently she is pursuing Ph.D programme in the Department of Information and Communication Engineering at Anna University Chennai, India. She has presented and published 10 research papers in international conferences & journals and authored 5 books. She is a life member of ISTE (Indian Society for Technical Education),IAENG (International Association of Engineers), and CSI (Computer Society of India). K.Thiagarajan working as Senior Lecturer in the Department of Mathematics in KCG College of Technology - Chennai-India. He has totally 14 years of experience in teaching. He has attended and presented research articles in 33 National and International Conferences and published one national journal and 26 international journals. Currently he is working on web mining through automata and set theory. His area of specialization is coloring of graphs and DNA Computing. Dr. K. Sarukesi has a very distinguished career spanning of nearly 40 years. He has a vast teaching experience in various universities in India and abroad. He was awarded a commonwealth scholarship by the association of common wealth universities, London for doing Ph.D in UK. He completed his Ph.D from the University of Warwick U.K in the year His area of specializations is Technological Information System. He worked as expert in various foreign universities. He has executed number of consultancy projects. he has been honored and awarded commendations for his work in the field of information technology by the government of TamilNadu. He has published over 40 research papers in international conferences/journals and 40 National Conferences/journals. 339
9 Appendix -1 Source Fuzzy Rules High Positive Zero High Negative Rule1 Rule2 Rule3 Rule4 Rule5 Consent Hol d Spa m Consent Spam Consent E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES Hol d 340
10 E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES 341
11 E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES 342
12 E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES 343
13 E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES 344
14 E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES E YES YES YES 345
A MATHEMATICAL APPROACH FOR FILTERING JUNK USING RELEVANCE ANALYSIS
A MATHEMATICAL APPROACH FOR FILTERING JUNK E-MAIL USING RELEVANCE ANALYSIS S.SathyaBama Assistant Professor, Department of MCA, Sri Krishna College of Technology, Coimbatore, Tamil Nadu, INDIA M.S.Irfan
More informationAn Empirical Performance Comparison of Machine Learning Methods for Spam Categorization
An Empirical Performance Comparison of Machine Learning Methods for Spam E-mail Categorization Chih-Chin Lai a Ming-Chi Tsai b a Dept. of Computer Science and Information Engineering National University
More informationSchematizing a Global SPAM Indicative Probability
Schematizing a Global SPAM Indicative Probability NIKOLAOS KORFIATIS MARIOS POULOS SOZON PAPAVLASSOPOULOS Department of Management Science and Technology Athens University of Economics and Business Athens,
More informationRelevance Ranking and Evaluation of Search Results through Web Content Mining
elevance anking and Evaluation of Search esults through Web Content Mining G Poonkuzhali, Kishore Kumar, P Sudhakar, GVUma, KSarukesi Abstract Nowadays, most of the people rely on web search engines to
More informationStatic Program Slicing for Composite Data using FSM-Model
Static Program Slicing for Composite Data using FSM-Model K. Thiagarajan, C.Saravanakumar, G. Poonkuzhali, Ponnammal Natarajan, S.Jeyabharathi Abstract In the software development life cycle, the identification
More informationAccuracy Analysis of Neural Networks in removal of unsolicited s
Accuracy Analysis of Neural Networks in removal of unsolicited e-mails P.Mohan Kumar P.Kumaresan S.Yokesh Babu Assistant Professor (Senior) Assistant Professor Assistant Professor (Senior) SITE SITE SCSE
More informationSathyamangalam, 2 ( PG Scholar,Department of Computer Science and Engineering,Bannari Amman Institute of Technology, Sathyamangalam,
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 8, Issue 5 (Jan. - Feb. 2013), PP 70-74 Performance Analysis Of Web Page Prediction With Markov Model, Association
More informationSHORTEST PATH ALGORITHM FOR QUERY PROCESSING IN PEER TO PEER NETWORKS
SHORTEST PATH ALGORITHM FOR QUERY PROCESSING IN PEER TO PEER NETWORKS Abstract U.V.ARIVAZHAGU * Research Scholar, Sathyabama University, Chennai, Tamilnadu, India arivu12680@gmail.com Dr.S.SRINIVASAN Director
More informationIMPLEMENTATION OF CLASSIFICATION ALGORITHMS USING WEKA NAÏVE BAYES CLASSIFIER
IMPLEMENTATION OF CLASSIFICATION ALGORITHMS USING WEKA NAÏVE BAYES CLASSIFIER N. Suresh Kumar, Dr. M. Thangamani 1 Assistant Professor, Sri Ramakrishna Engineering College, Coimbatore, India 2 Assistant
More informationC.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan
Enhancing DES Using Local Languages C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan Abstract: Network services and internet plays vital role in transmitting information from source to destination.
More informationSTUDYING OF CLASSIFYING CHINESE SMS MESSAGES
STUDYING OF CLASSIFYING CHINESE SMS MESSAGES BASED ON BAYESIAN CLASSIFICATION 1 LI FENG, 2 LI JIGANG 1,2 Computer Science Department, DongHua University, Shanghai, China E-mail: 1 Lifeng@dhu.edu.cn, 2
More informationA Simulation Based Comparative Study of Normalization Procedures in Multiattribute Decision Making
Proceedings of the 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases, Corfu Island, Greece, February 16-19, 2007 102 A Simulation Based Comparative Study of Normalization
More informationA Level-wise Priority Based Task Scheduling for Heterogeneous Systems
International Journal of Information and Education Technology, Vol., No. 5, December A Level-wise Priority Based Task Scheduling for Heterogeneous Systems R. Eswari and S. Nickolas, Member IACSIT Abstract
More informationPERFORMANCE OF MACHINE LEARNING TECHNIQUES FOR SPAM FILTERING
PERFORMANCE OF MACHINE LEARNING TECHNIQUES FOR EMAIL SPAM FILTERING M. Deepika 1 Shilpa Rani 2 1,2 Assistant Professor, Department of Computer Science & Engineering, Sreyas Institute of Engineering & Technology,
More informationCollaborative Spam Mail Filtering Model Design
I.J. Education and Management Engineering, 2013, 2, 66-71 Published Online February 2013 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2013.02.11 Available online at http://www.mecs-press.net/ijeme
More informationISSN: Page 320
A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar
More informationFiltering Spam Using Fuzzy Expert System 1 Hodeidah University, Faculty of computer science and engineering, Yemen 3, 4
Filtering Spam Using Fuzzy Expert System 1 Siham A. M. Almasan, 2 Wadeea A. A. Qaid, 3 Ahmed Khalid, 4 Ibrahim A. A. Alqubati 1, 2 Hodeidah University, Faculty of computer science and engineering, Yemen
More informationFighting Spam, Phishing and Malware With Recurrent Pattern Detection
Fighting Spam, Phishing and Malware With Recurrent Pattern Detection White Paper September 2017 www.cyren.com 1 White Paper September 2017 Fighting Spam, Phishing and Malware With Recurrent Pattern Detection
More informationDiagnosis of Spams Some Statistical Considerations
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 4 (August 2012), PP. 05-09 Diagnosis of Email Spams Some Statistical Considerations
More informationAdvanced Spam Detection Methodology by the Neural Network Classifier
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationContent Based Spam Filtering
2016 International Conference on Collaboration Technologies and Systems Content Based Spam E-mail Filtering 2nd Author Pingchuan Liu and Teng-Sheng Moh Department of Computer Science San Jose State University
More informationKeywords : Bayesian, classification, tokens, text, probability, keywords. GJCST-C Classification: E.5
Global Journal of Computer Science and Technology Software & Data Engineering Volume 12 Issue 13 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global
More informationNon-ML Anti-Spamming: A Role Based Solution
Non-ML Anti-Spamming: A Role Based Solution Anthony Y. Fu, Email: anthony@cs.cityu.edu.hk WebPage: http://www.cs.cityu.edu.hk/~anthony Department of Computer Science, City University of Hong Kong Hong
More informationUse and Abuse of Anti-Spam White/Black Lists
Page 1 of 5 Use and Abuse of Anti-Spam White/Black Lists September 26, 2006 White and Black lists are standard spam filters. Their typically simple interface, provide a way to quickly identify emails as
More informationInformation Extraction from Spam s using Stylistic and Semantic Features to Identify Spammers
Information Extraction from Spam using Stylistic and Semantic Features to Identify Spammers Soma Halder University of Alabama at Birmingham soma@cis.uab.edu Richa Tiwari University of Alabama at Birmingham
More informationVelammal Engineering College Department of Computer Science and Engineering
Velammal Engineering College Department of Computer Science and Engineering Name & Photo : Prof.B.Rajalakshmi Designation: Qualification : Area of Specialization : Teaching Experience : Vice Principal
More informationIntroduction This paper will discuss the best practices for stopping the maximum amount of SPAM arriving in a user's inbox. It will outline simple
Table of Contents Introduction...2 Overview...3 Common techniques to identify SPAM...4 Greylisting...5 Dictionary Attack...5 Catchalls...5 From address...5 HELO / EHLO...6 SPF records...6 Detecting SPAM...6
More informationMeta-Content framework for back index generation
Meta-Content framework for back index generation Tripti Sharma, Assistant Professor Department of computer science Chhatrapati Shivaji Institute of Technology. Durg, India triptisharma@csitdurg.in Sarang
More informationOn Effective Classification via Neural Networks
On Effective E-mail Classification via Neural Networks Bin Cui 1, Anirban Mondal 2, Jialie Shen 3, Gao Cong 4, and Kian-Lee Tan 1 1 Singapore-MIT Alliance, National University of Singapore {cuibin, tankl}@comp.nus.edu.sg
More informationText Classification for Spam Using Naïve Bayesian Classifier
Text Classification for E-mail Spam Using Naïve Bayesian Classifier Priyanka Sao 1, Shilpi Chaubey 2, Sonali Katailiha 3 1,2,3 Assistant ProfessorCSE Dept, Columbia Institute of Engg&Tech, Columbia Institute
More informationFACULTY PROFILE. Total Experience : Academic : 7 Years and 3 Months. Degree Branch / Specialization College University
FACULTY PROFILE Name Designation Email ID : A.K.Kavitha : Assistant Professor : kavitha.ece@srit.org Area of Specialization : Wireless Communication Total Experience : Academic : 7 Years and 3 Industry
More informationSCSUG 2017 Classifying and Predicting Spam Messages using Text Mining in SAS Enterprise Miner
SCSUG 2017 Classifying and Predicting Spam Messages using Text Mining in SAS Enterprise Miner Mounika Kondamudi, Oklahoma State University, Mentored by Balamurugan Mohan, H&R Block Abstract In this technologically
More informationEthical Hacking and. Version 6. Spamming
Ethical Hacking and Countermeasures Version 6 Module XL Spamming News Source: http://www.nzherald.co.nz/ Module Objective This module will familiarize you with: Spamming Techniques used by Spammers How
More informationIncreasing the Accuracy of a Spam-Detecting Artificial Immune System
Increasing the Accuracy of a Spam-Detecting Artificial Immune System Terri Oda Carleton University 1125 Colonel By Drive Ottawa, ON K1S 5B6 terri@zone12.com Tony White Carleton University 1125 Colonel
More informationI. INTRODUCTION. Image Acquisition. Denoising in Wavelet Domain. Enhancement. Binarization. Thinning. Feature Extraction. Matching
A Comparative Analysis on Fingerprint Binarization Techniques K Sasirekha Department of Computer Science Periyar University Salem, Tamilnadu Ksasirekha7@gmail.com K Thangavel Department of Computer Science
More informationSPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR Kunjali Pawar 1 and Madhuri Patil 2 1 M.E. Student, Dr. D.Y.Patil School of Engg. And Technology, Lohegaon, Pune, Savitribai Phule Pune
More informationBest Customer Services among the E-Commerce Websites A Predictive Analysis
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issues 6 June 2016, Page No. 17088-17095 Best Customer Services among the E-Commerce Websites A Predictive
More informationDomain name system black list false reporting attack
Domain name system black list false reporting attack Ing. Miloš Očkay, PhD 1, Ing. Martin Javurek 2, 1 Department of Informatics Armed Forces Academy of gen. M. R. Štefánik Liptovský Mikuláš, Slovakia
More informationSPAM PRECAUTIONS: A SURVEY
International Journal of Advanced Research in Engineering ISSN: 2394-2819 Technology & Sciences Email:editor@ijarets.org May-2016 Volume 3, Issue-5 www.ijarets.org EMAIL SPAM PRECAUTIONS: A SURVEY Aishwarya,
More informationA Technical Analysis of Market Basket by using Association Rule Mining and Apriori Algorithm
A Technical Analysis of Market Basket by using Association Rule Mining and Apriori Algorithm S.Pradeepkumar*, Mrs.C.Grace Padma** M.Phil Research Scholar, Department of Computer Science, RVS College of
More informationWITH INTEGRITY
EMAIL WITH INTEGRITY Reaching for inboxes in a world of spam a white paper by: www.oprius.com Table of Contents... Introduction 1 Defining Spam 2 How Spam Affects Your Earnings 3 Double Opt-In Versus Single
More informationINTERNATIONAL JOURNAL OF MERGING TECHNOLOGY AND ADVANCED RESEARCH IN COMPUTING ON MULTIMEDIA CONTENT TRUST MODELING APPROACHES SOCIAL TAGGING
ON MULTIMEDIA CONTENT TRUST MODELING APPROACHES SOCIAL TAGGING [1] Soppari Swapna M.Tech(CSE) Sree Dattha Institute Of Engineering & Sciences, Hyd [2] L ROSHINI Assistant professor Computer Science Department
More informationA Novel Architecture of Parallel Multiplier Using Modified Booth s Recoding Unit and Adder for Signed and Unsigned Numbers
International Journal of Research Studies in Science, Engineering and Technology Volume 2, Issue 8, August 2015, PP 55-61 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Architecture of Parallel
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue:
More informationUsing AdaBoost and Decision Stumps to Identify Spam
Using AdaBoost and Decision Stumps to Identify Spam E-mail Tyrone Nicholas June 4, 2003 Abstract An existing spam e-mail filter using the Naive Bayes decision engine was retrofitted with one based on the
More informationTopological Design of Minimum Cost Survivable Computer Communication Networks: Bipartite Graph Method
Topological Design of Minimum Cost Survivable Computer Communication Networks: Bipartite Graph Method Kamalesh V.N Research Scholar, Department of Computer Science and Engineering, Sathyabama University,
More informationFUZZY LOGIC WITH ENGINEERING APPLICATIONS
FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition Timothy J. Ross University of New Mexico, USA A John Wiley and Sons, Ltd., Publication FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition FUZZY
More informationImage Spam. Introduction. Project description:
Image Spam Introduction Image spam is a kind of E-mail spam where the message text of the spam is presented as a picture in an image file. Since most modern graphical E-mail client software will render
More informationA Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics
A Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics Helmut Berger and Dieter Merkl 2 Faculty of Information Technology, University of Technology, Sydney, NSW, Australia hberger@it.uts.edu.au
More informationA study of classification algorithms using Rapidminer
Volume 119 No. 12 2018, 15977-15988 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A study of classification algorithms using Rapidminer Dr.J.Arunadevi 1, S.Ramya 2, M.Ramesh Raja
More informationTECHNIQUES FOR COMPONENT REUSABLE APPROACH
TECHNIQUES FOR COMPONENT REUSABLE APPROACH Sukanay.M 1, Biruntha.S 2, Dr.Karthik.S 3, Kalaikumaran.T 4 1 II year M.E SE, Department of Computer Science & Engineering (PG) sukanmukesh@gmail.com 2 II year
More informationPanda Security. Protection. User s Manual. Protection. Version PM & Business Development Team
Panda Security Email Protection Email Protection PM & Business Development Team User s Manual Version 4.3.2-2 1 Table of Contents Table of Contents... 2 1. Introduction to Email Protection... 3 2. Email
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1
Cluster Based Speed and Effective Feature Extraction for Efficient Search Engine Manjuparkavi A 1, Arokiamuthu M 2 1 PG Scholar, Computer Science, Dr. Pauls Engineering College, Villupuram, India 2 Assistant
More informationTERM BASED WEIGHT MEASURE FOR INFORMATION FILTERING IN SEARCH ENGINES
TERM BASED WEIGHT MEASURE FOR INFORMATION FILTERING IN SEARCH ENGINES Mu. Annalakshmi Research Scholar, Department of Computer Science, Alagappa University, Karaikudi. annalakshmi_mu@yahoo.co.in Dr. A.
More informationEfficacious Spam Filtering and Detection in Social Networks
Indian Journal of Science and Technology, Vol 7(S7), 180 184, November 2014 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Efficacious Spam Filtering and Detection in Social Networks U. V. Anbazhagu
More informationA Reputation-based Collaborative Approach for Spam Filtering
Available online at www.sciencedirect.com ScienceDirect AASRI Procedia 5 (2013 ) 220 227 2013 AASRI Conference on Parallel and Distributed Computing Systems A Reputation-based Collaborative Approach for
More informationDomain-specific Concept-based Information Retrieval System
Domain-specific Concept-based Information Retrieval System L. Shen 1, Y. K. Lim 1, H. T. Loh 2 1 Design Technology Institute Ltd, National University of Singapore, Singapore 2 Department of Mechanical
More informationAn Experimental Evaluation of Spam Filter Performance and Robustness Against Attack
An Experimental Evaluation of Spam Filter Performance and Robustness Against Attack Steve Webb, Subramanyam Chitti, and Calton Pu {webb, chittis, calton}@cc.gatech.edu College of Computing Georgia Institute
More informationClassification Key Concepts
http://poloclub.gatech.edu/cse6242 CSE6242 / CX4242: Data & Visual Analytics Classification Key Concepts Duen Horng (Polo) Chau Assistant Professor Associate Director, MS Analytics Georgia Tech 1 How will
More informationThe Spam Problem. Suresh Ramasubramanian, IBM Joe St Sauver, M 3 AAWG Senior Technical Advisor October 2012 New Delhi
The Spam Problem Suresh Ramasubramanian, IBM Joe St Sauver, M 3 AAWG Senior Technical Advisor October 2012 New Delhi M 3 AAWG Workshop: Fighting Spam and Bots EWI, NASSCOM, FICCI 3rd Worldwide Cybersecurity
More informationOntology Based Search Engine
Ontology Based Search Engine K.Suriya Prakash / P.Saravana kumar Lecturer / HOD / Assistant Professor Hindustan Institute of Engineering Technology Polytechnic College, Padappai, Chennai, TamilNadu, India
More informationAnalysis of Classifications of Unsolicited Bulk s
Analysis of Classifications of Unsolicited Bulk Emails Jatinderkumar R. Saini, Apurva A. Desai Abstract In recent times, the problem of Unsolicited Bulk Email (UBE) or commonly known as Spam Email, has
More informationMASTER OF SCIENCE IN COMPUTER SCIENCE
THE UNIVERSITY OF ZAMBIA SCHOOL OF NATURAL SCIENCES DEPARTMENT OF COMPUTER STUDIES MASTER OF SCIENCE IN COMPUTER SCIENCE November 2014 1) BACKGROUND From the inception of Computer Science programmes at
More informationDONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY
DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an
More informationFiltering Spam by Using Factors Hyperbolic Trees
Filtering Spam by Using Factors Hyperbolic Trees Hailong Hou*, Yan Chen, Raheem Beyah, Yan-Qing Zhang Department of Computer science Georgia State University P.O. Box 3994 Atlanta, GA 30302-3994, USA *Contact
More informationCOMPARISON OF DIFFERENT CLASSIFICATION TECHNIQUES
COMPARISON OF DIFFERENT CLASSIFICATION TECHNIQUES USING DIFFERENT DATASETS V. Vaithiyanathan 1, K. Rajeswari 2, Kapil Tajane 3, Rahul Pitale 3 1 Associate Dean Research, CTS Chair Professor, SASTRA University,
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, ISSN:
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 20131 Improve Search Engine Relevance with Filter session Addlin Shinney R 1, Saravana Kumar T
More informationISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationA Novel Feature Selection Framework for Automatic Web Page Classification
International Journal of Automation and Computing 9(4), August 2012, 442-448 DOI: 10.1007/s11633-012-0665-x A Novel Feature Selection Framework for Automatic Web Page Classification J. Alamelu Mangai 1
More informationClassifying and Predicting Spam Messages Using Text Mining in SAS Enterprise Miner Session ID: 2650
Classifying and Predicting Spam Messages Using Text Mining in SAS Enterprise Miner Session ID: 2650 Mounika Kondamudi, Oklahoma State University Mentored by Balamurugan Mohan, H&R Block SAS and all other
More informationJohnson Controls Foundation Scholarship Program
Johnson Controls Foundation Scholarship Program Several hundred students have been assisted by means of this program in the past. Again this year, we hope that the financial support these scholarships
More informationStudy on Classifiers using Genetic Algorithm and Class based Rules Generation
2012 International Conference on Software and Computer Applications (ICSCA 2012) IPCSIT vol. 41 (2012) (2012) IACSIT Press, Singapore Study on Classifiers using Genetic Algorithm and Class based Rules
More informationADAPTIVE HANDLING OF 3V S OF BIG DATA TO IMPROVE EFFICIENCY USING HETEROGENEOUS CLUSTERS
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 ADAPTIVE HANDLING OF 3V S OF BIG DATA TO IMPROVE EFFICIENCY USING HETEROGENEOUS CLUSTERS Radhakrishnan R 1, Karthik
More informationPERSONALIZATION OF MESSAGES
PERSONALIZATION OF E-MAIL MESSAGES Arun Pandian 1, Balaji 2, Gowtham 3, Harinath 4, Hariharan 5 1,2,3,4 Student, Department of Computer Science and Engineering, TRP Engineering College,Tamilnadu, India
More informationEFFECTIVE EFFICIENT BOOLEAN RETRIEVAL
EFFECTIVE EFFICIENT BOOLEAN RETRIEVAL J Naveen Kumar 1, Dr. M. Janga Reddy 2 1 jnaveenkumar6@gmail.com, 2 pricipalcmrit@gmail.com 1 M.Tech Student, Department of Computer Science, CMR Institute of Technology,
More informationPossibility Theory-Based Approach to Spam Detection
2007 IEEE International Conference on Granular Computing Possibility Theory-Based Approach to Spam Email Detection Dat Tran (1), Wanli Ma (1), Dharmendra Sharma (1), and Thien Nguyen (2) (1) University
More informationImproving Newsletter Delivery with Certified Opt-In An Executive White Paper
Improving Newsletter Delivery with Certified Opt-In E-Mail An Executive White Paper Coravue, Inc. 7742 Redlands St., #3041 Los Angeles, CA 90293 USA (310) 305-1525 www.coravue.com Table of Contents Introduction...1
More informationChapter-8. Conclusion and Future Scope
Chapter-8 Conclusion and Future Scope This thesis has addressed the problem of Spam E-mails. In this work a Framework has been proposed. The proposed framework consists of the three pillars which are Legislative
More informationKeywords Fuzzy, Set Theory, KDD, Data Base, Transformed Database.
Volume 6, Issue 5, May 016 ISSN: 77 18X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Fuzzy Logic in Online
More informationCollaborative Filtering. Doug Herbers Master s Oral Defense June 28, 2005
Collaborative E-Mail Filtering Doug Herbers Master s Oral Defense June 28, 2005 Background Spamming the use of any electronic communications medium to send unsolicited messages in bulk E-Mail is the most
More informationINFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM
INFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM G.Amlu #1 S.Chandralekha #2 and PraveenKumar *1 # B.Tech, Information Technology, Anand Institute of Higher Technology, Chennai, India
More informationSmart Test Case Quantifier Using MC/DC Coverage Criterion
Smart Test Case Quantifier Using MC/DC Coverage Criterion S. Shanmuga Priya 1, Sheba Kezia Malarchelvi 2 Abstract Software testing, an important phase in Software Development Life Cycle (SDLC) is a time
More informationEducational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan.
Mrs. Vijaya Umesh Pinjarkar Mobile : 9757143228 Email: vkhirodkar@somaiya.edu Professional Objective To utilize my teaching skills towards a challenging career in growth oriented and leading edge that
More informationComputer aided mail filtering using SVM
Computer aided mail filtering using SVM Lin Liao, Jochen Jaeger Department of Computer Science & Engineering University of Washington, Seattle Introduction What is SPAM? Electronic version of junk mail,
More informationA REVIEW PAPER ON IMAGE SPAM FILTERING
International Journal of Latest Trends in Engineering and Technology Vol.(8)Issue(2), pp.307-313 DOI: http://dx.doi.org/10.21172/1.82.042 e-issn:2278-621x A REVIEW PAPER ON IMAGE SPAM FILTERING Sneha Nikam
More informationThe Comparison of CBA Algorithm and CBS Algorithm for Meteorological Data Classification Mohammad Iqbal, Imam Mukhlash, Hanim Maria Astuti
Information Systems International Conference (ISICO), 2 4 December 2013 The Comparison of CBA Algorithm and CBS Algorithm for Meteorological Data Classification Mohammad Iqbal, Imam Mukhlash, Hanim Maria
More informationWeb Data mining-a Research area in Web usage mining
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 22-26 Web Data mining-a Research area in Web usage mining 1 V.S.Thiyagarajan,
More informationCopyright Detection System for Videos Using TIRI-DCT Algorithm
Research Journal of Applied Sciences, Engineering and Technology 4(24): 5391-5396, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: March 18, 2012 Accepted: June 15, 2012 Published:
More informationAcceptable Use Policy
Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable
More informationFootprint Recognition using Modified Sequential Haar Energy Transform (MSHET)
47 Footprint Recognition using Modified Sequential Haar Energy Transform (MSHET) V. D. Ambeth Kumar 1 M. Ramakrishnan 2 1 Research scholar in sathyabamauniversity, Chennai, Tamil Nadu- 600 119, India.
More informationWord Disambiguation in Web Search
Word Disambiguation in Web Search Rekha Jain Computer Science, Banasthali University, Rajasthan, India Email: rekha_leo2003@rediffmail.com G.N. Purohit Computer Science, Banasthali University, Rajasthan,
More informationChoic Anti-Spam Quick Start Guide
ChoiceMail Anti-Spam Quick Start Guide 2005 Version 3.x Welcome to ChoiceMail Welcome to ChoiceMail Enterprise, the most effective anti-spam protection available. This guide will show you how to set up
More informationGEORGE J. ANDERS, Ph.D., P.Eng., Fellow IEEE
GEORGE J. ANDERS, Ph.D., P.Eng., Fellow IEEE George Anders is a president of Anders Consulting. Between 1975 and 2012 he has been employed by Ontario Hydro and its successor companies in Toronto, Canada.
More informationUser Signature Identification and Image Pixel Pattern Verification
Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 3193-3202 Research India Publications http://www.ripublication.com User Signature Identification and Image
More informationURL ATTACKS: Classification of URLs via Analysis and Learning
International Journal of Electrical and Computer Engineering (IJECE) Vol. 6, No. 3, June 2016, pp. 980 ~ 985 ISSN: 2088-8708, DOI: 10.11591/ijece.v6i3.7208 980 URL ATTACKS: Classification of URLs via Analysis
More informationSpam Classification Documentation
Spam Classification Documentation What is SPAM? Unsolicited, unwanted email that was sent indiscriminately, directly or indirectly, by a sender having no current relationship with the recipient. Objective:
More information2014, IJARCSSE All Rights Reserved Page 303
Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Software
More informationGFI Product Comparison. GFI MailEssentials vs Sophos PureMessage
GFI Product Comparison GFI MailEssentials vs PureMessage GFI MailEssentials Integrates with Microsoft Exchange Server 2003/2007/2010/2013 Scans incoming and outgoing emails Scans internal emails within
More informationInternational Journal of Software and Web Sciences (IJSWS)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
More informationIdentifying Layout Classes for Mathematical Symbols Using Layout Context
Rochester Institute of Technology RIT Scholar Works Articles 2009 Identifying Layout Classes for Mathematical Symbols Using Layout Context Ling Ouyang Rochester Institute of Technology Richard Zanibbi
More information